social engineering defense evasion SyssecAdmin virus FTP hacker PII exploit BEC escalation malware network risk assessment zero- day incident firewall spam spoofing smishing vulnerability password bug CIA triad Dark Web integrity worm IOC APT Cyber Defense IPS ransomware EDR compliance encryption training IDS insider threat HIPAA risk business continuity rootkit passphrase breach VPN botnet PHI spyware MFA cryptography WISP cyber attack identity theft admin availability confidentiality Proofpoint IoT security policy DDoS Defense- in-depth OS vishing antivirus IP packet phishing Cyber Security resilience security awareness pentest Security Operations incident response social engineering defense evasion SyssecAdmin virus FTP hacker PII exploit BEC escalation malware network risk assessment zero- day incident firewall spam spoofing smishing vulnerability password bug CIA triad Dark Web integrity worm IOC APT Cyber Defense IPS ransomware EDR compliance encryption training IDS insider threat HIPAA risk business continuity rootkit passphrase breach VPN botnet PHI spyware MFA cryptography WISP cyber attack identity theft admin availability confidentiality Proofpoint IoT security policy DDoS Defense- in-depth OS vishing antivirus IP packet phishing Cyber Security resilience security awareness pentest Security Operations incident response
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
social engineering
defense evasion
SyssecAdmin
virus
FTP
hacker
PII
exploit
BEC
escalation
malware
network
risk assessment
zero-day
incident
firewall
spam
spoofing
smishing
vulnerability
password
bug
CIA triad
Dark Web
integrity
worm
IOC
APT
Cyber Defense
IPS
ransomware
EDR
compliance
encryption
training
IDS
insider threat
HIPAA
risk
business continuity
rootkit
passphrase
breach
VPN
botnet
PHI
spyware
MFA
cryptography
WISP
cyber attack
identity theft
admin
availability
confidentiality
Proofpoint
IoT
security policy
DDoS
Defense-in-depth
OS
vishing
antivirus
IP
packet
phishing
Cyber Security
resilience
security awareness
pentest
Security Operations
incident response